Analysis
-
max time kernel
52s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 00:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe
Resource
win7-20240220-en
6 signatures
150 seconds
General
-
Target
90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe
-
Size
73KB
-
MD5
c3562d68d34f1fdd66d5bafa9f1e56c5
-
SHA1
d11de718142da617f1d202fad6583bda06b77ccc
-
SHA256
90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf
-
SHA512
3b7b1f4ba3ba329e60877dc01788f1221222ac37ee45de0e7bdeaf72fbf0e74e94ca8cacf6f4443d1c5747e47d5ea0150ed3d8a6c4cb9f47d6f5025f5e5a3a10
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDWiekja1br3GGBxfot0i94:ymb3NkkiQ3mdBjFWXkj7afog
Malware Config
Signatures
-
Detect Blackmoon payload 34 IoCs
resource yara_rule behavioral1/memory/2080-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/808-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/680-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1860-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1360-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/580-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/960-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1988-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2224-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2064-329-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-345-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-359-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-368-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-371-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-506-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1416-514-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-570-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2712-782-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-919-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1728-2838-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 57 IoCs
resource yara_rule behavioral1/memory/2080-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2080-1-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2524-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1984-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2632-41-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2580-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2688-61-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2432-81-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2196-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/808-103-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2392-113-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/680-124-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2320-140-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1860-161-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1360-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2368-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/580-216-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/960-244-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/960-246-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1988-257-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3028-274-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2236-277-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2020-294-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2224-305-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2064-329-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2764-345-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2636-359-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2680-368-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2528-371-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1276-469-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/604-506-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1416-514-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3064-570-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1216-599-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1448-768-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2712-782-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2968-919-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1688-1767-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2492-2459-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1892-2516-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2364-2574-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2648-2603-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1584-2618-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1616-2633-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2260-2648-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2188-2678-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2064-2707-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2632-2722-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2904-2737-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1856-2794-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1880-2809-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1728-2838-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2876-2937-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2684-3043-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/240-3100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1972-3122-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 1984 btnnbh.exe 2524 rlflxfr.exe 2632 bnbbhb.exe 2540 xrlrrrx.exe 2688 jdvjj.exe 2580 hbbhhh.exe 2432 pjvdd.exe 2832 5xrrrrf.exe 2196 ppjjj.exe 808 nntnhn.exe 2392 jjvjj.exe 680 btnhtt.exe 2320 pdvpj.exe 328 tnntnh.exe 2708 xrlrxxl.exe 1860 htbhtt.exe 1360 pjdvd.exe 2812 hhhhnt.exe 2264 llfxlrf.exe 2368 tnbhnt.exe 580 jjvjp.exe 1076 9ttbbh.exe 1436 5xrxxxf.exe 2388 bhhbbt.exe 960 xlxfxxl.exe 1988 hnbhnn.exe 3028 jjdjv.exe 2236 tnnnnt.exe 2020 ffrxlxf.exe 1412 vvjdd.exe 2224 xrffflr.exe 1740 pvddj.exe 2064 1tnnbh.exe 1508 7dddj.exe 2652 thhtht.exe 2764 5dvdp.exe 2636 7xxlrxf.exe 2680 vpjjj.exe 2528 jdppp.exe 2460 ppppv.exe 2356 vvjvj.exe 2436 1tbthh.exe 2832 bnhbhh.exe 1592 ffxfffr.exe 1352 pdjvv.exe 1580 dvjdj.exe 1808 3htttn.exe 2372 fxfflll.exe 776 xfrrxll.exe 2328 jpvvv.exe 1904 xrllfrx.exe 1368 pdddj.exe 1276 xxxxxrx.exe 2852 nhbhbt.exe 1268 9tbtbt.exe 2608 1xrxxff.exe 1236 vpjjp.exe 604 nbhthh.exe 1416 fxlxrxl.exe 300 5bbbhn.exe 2484 htnnnt.exe 548 fxrxfff.exe 112 lrffxxf.exe 632 xlxrxrr.exe -
resource yara_rule behavioral1/memory/2080-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2080-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/808-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/680-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1860-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1360-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/580-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/960-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/960-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1988-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-294-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-305-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2064-329-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-345-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-359-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-368-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-371-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1276-469-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-506-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1416-514-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-570-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1216-599-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1448-768-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-782-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-919-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-1767-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1596-2238-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-2459-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1892-2516-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2364-2574-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-2603-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1584-2618-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1616-2633-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-2648-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-2678-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2064-2707-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-2722-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-2737-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-2794-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-2809-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-2838-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-2937-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-3043-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/240-3100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-3122-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1984 2080 90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe 28 PID 2080 wrote to memory of 1984 2080 90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe 28 PID 2080 wrote to memory of 1984 2080 90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe 28 PID 2080 wrote to memory of 1984 2080 90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe 28 PID 1984 wrote to memory of 2524 1984 btnnbh.exe 29 PID 1984 wrote to memory of 2524 1984 btnnbh.exe 29 PID 1984 wrote to memory of 2524 1984 btnnbh.exe 29 PID 1984 wrote to memory of 2524 1984 btnnbh.exe 29 PID 2524 wrote to memory of 2632 2524 rlflxfr.exe 30 PID 2524 wrote to memory of 2632 2524 rlflxfr.exe 30 PID 2524 wrote to memory of 2632 2524 rlflxfr.exe 30 PID 2524 wrote to memory of 2632 2524 rlflxfr.exe 30 PID 2632 wrote to memory of 2540 2632 bnbbhb.exe 31 PID 2632 wrote to memory of 2540 2632 bnbbhb.exe 31 PID 2632 wrote to memory of 2540 2632 bnbbhb.exe 31 PID 2632 wrote to memory of 2540 2632 bnbbhb.exe 31 PID 2540 wrote to memory of 2688 2540 xrlrrrx.exe 32 PID 2540 wrote to memory of 2688 2540 xrlrrrx.exe 32 PID 2540 wrote to memory of 2688 2540 xrlrrrx.exe 32 PID 2540 wrote to memory of 2688 2540 xrlrrrx.exe 32 PID 2688 wrote to memory of 2580 2688 jdvjj.exe 33 PID 2688 wrote to memory of 2580 2688 jdvjj.exe 33 PID 2688 wrote to memory of 2580 2688 jdvjj.exe 33 PID 2688 wrote to memory of 2580 2688 jdvjj.exe 33 PID 2580 wrote to memory of 2432 2580 hbbhhh.exe 34 PID 2580 wrote to memory of 2432 2580 hbbhhh.exe 34 PID 2580 wrote to memory of 2432 2580 hbbhhh.exe 34 PID 2580 wrote to memory of 2432 2580 hbbhhh.exe 34 PID 2432 wrote to memory of 2832 2432 pjvdd.exe 35 PID 2432 wrote to memory of 2832 2432 pjvdd.exe 35 PID 2432 wrote to memory of 2832 2432 pjvdd.exe 35 PID 2432 wrote to memory of 2832 2432 pjvdd.exe 35 PID 2832 wrote to memory of 2196 2832 5xrrrrf.exe 36 PID 2832 wrote to memory of 2196 2832 5xrrrrf.exe 36 PID 2832 wrote to memory of 2196 2832 5xrrrrf.exe 36 PID 2832 wrote to memory of 2196 2832 5xrrrrf.exe 36 PID 2196 wrote to memory of 808 2196 ppjjj.exe 37 PID 2196 wrote to memory of 808 2196 ppjjj.exe 37 PID 2196 wrote to memory of 808 2196 ppjjj.exe 37 PID 2196 wrote to memory of 808 2196 ppjjj.exe 37 PID 808 wrote to memory of 2392 808 nntnhn.exe 38 PID 808 wrote to memory of 2392 808 nntnhn.exe 38 PID 808 wrote to memory of 2392 808 nntnhn.exe 38 PID 808 wrote to memory of 2392 808 nntnhn.exe 38 PID 2392 wrote to memory of 680 2392 jjvjj.exe 39 PID 2392 wrote to memory of 680 2392 jjvjj.exe 39 PID 2392 wrote to memory of 680 2392 jjvjj.exe 39 PID 2392 wrote to memory of 680 2392 jjvjj.exe 39 PID 680 wrote to memory of 2320 680 btnhtt.exe 40 PID 680 wrote to memory of 2320 680 btnhtt.exe 40 PID 680 wrote to memory of 2320 680 btnhtt.exe 40 PID 680 wrote to memory of 2320 680 btnhtt.exe 40 PID 2320 wrote to memory of 328 2320 pdvpj.exe 41 PID 2320 wrote to memory of 328 2320 pdvpj.exe 41 PID 2320 wrote to memory of 328 2320 pdvpj.exe 41 PID 2320 wrote to memory of 328 2320 pdvpj.exe 41 PID 328 wrote to memory of 2708 328 tnntnh.exe 42 PID 328 wrote to memory of 2708 328 tnntnh.exe 42 PID 328 wrote to memory of 2708 328 tnntnh.exe 42 PID 328 wrote to memory of 2708 328 tnntnh.exe 42 PID 2708 wrote to memory of 1860 2708 xrlrxxl.exe 43 PID 2708 wrote to memory of 1860 2708 xrlrxxl.exe 43 PID 2708 wrote to memory of 1860 2708 xrlrxxl.exe 43 PID 2708 wrote to memory of 1860 2708 xrlrxxl.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe"C:\Users\Admin\AppData\Local\Temp\90ffd9dd79184ab786a17c224d78edaca4eec8fc7c53db692f8ebd47c045f4cf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\btnnbh.exec:\btnnbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
\??\c:\rlflxfr.exec:\rlflxfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\bnbbhb.exec:\bnbbhb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\xrlrrrx.exec:\xrlrrrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\jdvjj.exec:\jdvjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\hbbhhh.exec:\hbbhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\pjvdd.exec:\pjvdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\5xrrrrf.exec:\5xrrrrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\ppjjj.exec:\ppjjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\nntnhn.exec:\nntnhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
\??\c:\jjvjj.exec:\jjvjj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\btnhtt.exec:\btnhtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\pdvpj.exec:\pdvpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\tnntnh.exec:\tnntnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:328 -
\??\c:\xrlrxxl.exec:\xrlrxxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\htbhtt.exec:\htbhtt.exe17⤵
- Executes dropped EXE
PID:1860 -
\??\c:\pjdvd.exec:\pjdvd.exe18⤵
- Executes dropped EXE
PID:1360 -
\??\c:\hhhhnt.exec:\hhhhnt.exe19⤵
- Executes dropped EXE
PID:2812 -
\??\c:\llfxlrf.exec:\llfxlrf.exe20⤵
- Executes dropped EXE
PID:2264 -
\??\c:\tnbhnt.exec:\tnbhnt.exe21⤵
- Executes dropped EXE
PID:2368 -
\??\c:\jjvjp.exec:\jjvjp.exe22⤵
- Executes dropped EXE
PID:580 -
\??\c:\9ttbbh.exec:\9ttbbh.exe23⤵
- Executes dropped EXE
PID:1076 -
\??\c:\5xrxxxf.exec:\5xrxxxf.exe24⤵
- Executes dropped EXE
PID:1436 -
\??\c:\bhhbbt.exec:\bhhbbt.exe25⤵
- Executes dropped EXE
PID:2388 -
\??\c:\xlxfxxl.exec:\xlxfxxl.exe26⤵
- Executes dropped EXE
PID:960 -
\??\c:\hnbhnn.exec:\hnbhnn.exe27⤵
- Executes dropped EXE
PID:1988 -
\??\c:\jjdjv.exec:\jjdjv.exe28⤵
- Executes dropped EXE
PID:3028 -
\??\c:\tnnnnt.exec:\tnnnnt.exe29⤵
- Executes dropped EXE
PID:2236 -
\??\c:\ffrxlxf.exec:\ffrxlxf.exe30⤵
- Executes dropped EXE
PID:2020 -
\??\c:\vvjdd.exec:\vvjdd.exe31⤵
- Executes dropped EXE
PID:1412 -
\??\c:\xrffflr.exec:\xrffflr.exe32⤵
- Executes dropped EXE
PID:2224 -
\??\c:\pvddj.exec:\pvddj.exe33⤵
- Executes dropped EXE
PID:1740 -
\??\c:\1tnnbh.exec:\1tnnbh.exe34⤵
- Executes dropped EXE
PID:2064 -
\??\c:\7dddj.exec:\7dddj.exe35⤵
- Executes dropped EXE
PID:1508 -
\??\c:\thhtht.exec:\thhtht.exe36⤵
- Executes dropped EXE
PID:2652 -
\??\c:\5dvdp.exec:\5dvdp.exe37⤵
- Executes dropped EXE
PID:2764 -
\??\c:\7xxlrxf.exec:\7xxlrxf.exe38⤵
- Executes dropped EXE
PID:2636 -
\??\c:\vpjjj.exec:\vpjjj.exe39⤵
- Executes dropped EXE
PID:2680 -
\??\c:\jdppp.exec:\jdppp.exe40⤵
- Executes dropped EXE
PID:2528 -
\??\c:\ppppv.exec:\ppppv.exe41⤵
- Executes dropped EXE
PID:2460 -
\??\c:\vvjvj.exec:\vvjvj.exe42⤵
- Executes dropped EXE
PID:2356 -
\??\c:\1tbthh.exec:\1tbthh.exe43⤵
- Executes dropped EXE
PID:2436 -
\??\c:\bnhbhh.exec:\bnhbhh.exe44⤵
- Executes dropped EXE
PID:2832 -
\??\c:\ffxfffr.exec:\ffxfffr.exe45⤵
- Executes dropped EXE
PID:1592 -
\??\c:\pdjvv.exec:\pdjvv.exe46⤵
- Executes dropped EXE
PID:1352 -
\??\c:\dvjdj.exec:\dvjdj.exe47⤵
- Executes dropped EXE
PID:1580 -
\??\c:\3htttn.exec:\3htttn.exe48⤵
- Executes dropped EXE
PID:1808 -
\??\c:\fxfflll.exec:\fxfflll.exe49⤵
- Executes dropped EXE
PID:2372 -
\??\c:\xfrrxll.exec:\xfrrxll.exe50⤵
- Executes dropped EXE
PID:776 -
\??\c:\jpvvv.exec:\jpvvv.exe51⤵
- Executes dropped EXE
PID:2328 -
\??\c:\xrllfrx.exec:\xrllfrx.exe52⤵
- Executes dropped EXE
PID:1904 -
\??\c:\pdddj.exec:\pdddj.exe53⤵
- Executes dropped EXE
PID:1368 -
\??\c:\xxxxxrx.exec:\xxxxxrx.exe54⤵
- Executes dropped EXE
PID:1276 -
\??\c:\nhbhbt.exec:\nhbhbt.exe55⤵
- Executes dropped EXE
PID:2852 -
\??\c:\9tbtbt.exec:\9tbtbt.exe56⤵
- Executes dropped EXE
PID:1268 -
\??\c:\1xrxxff.exec:\1xrxxff.exe57⤵
- Executes dropped EXE
PID:2608 -
\??\c:\vpjjp.exec:\vpjjp.exe58⤵
- Executes dropped EXE
PID:1236 -
\??\c:\nbhthh.exec:\nbhthh.exe59⤵
- Executes dropped EXE
PID:604 -
\??\c:\fxlxrxl.exec:\fxlxrxl.exe60⤵
- Executes dropped EXE
PID:1416 -
\??\c:\5bbbhn.exec:\5bbbhn.exe61⤵
- Executes dropped EXE
PID:300 -
\??\c:\htnnnt.exec:\htnnnt.exe62⤵
- Executes dropped EXE
PID:2484 -
\??\c:\fxrxfff.exec:\fxrxfff.exe63⤵
- Executes dropped EXE
PID:548 -
\??\c:\lrffxxf.exec:\lrffxxf.exe64⤵
- Executes dropped EXE
PID:112 -
\??\c:\xlxrxrr.exec:\xlxrxrr.exe65⤵
- Executes dropped EXE
PID:632 -
\??\c:\vpdjj.exec:\vpdjj.exe66⤵PID:1208
-
\??\c:\btnbhn.exec:\btnbhn.exe67⤵PID:3064
-
\??\c:\lfrxffr.exec:\lfrxffr.exe68⤵PID:2860
-
\??\c:\xxxrrrr.exec:\xxxrrrr.exe69⤵PID:576
-
\??\c:\9dpdd.exec:\9dpdd.exe70⤵PID:2816
-
\??\c:\5ntbbt.exec:\5ntbbt.exe71⤵PID:2804
-
\??\c:\rlfllrr.exec:\rlfllrr.exe72⤵PID:1216
-
\??\c:\xxrrfxl.exec:\xxrrfxl.exe73⤵PID:2604
-
\??\c:\xlxxfll.exec:\xlxxfll.exe74⤵PID:1924
-
\??\c:\ddppv.exec:\ddppv.exe75⤵PID:1724
-
\??\c:\nnnbth.exec:\nnnbth.exe76⤵PID:1524
-
\??\c:\rrrxxlr.exec:\rrrxxlr.exe77⤵PID:1508
-
\??\c:\5jvdd.exec:\5jvdd.exe78⤵PID:2532
-
\??\c:\tnhntb.exec:\tnhntb.exe79⤵PID:2576
-
\??\c:\3xxfffl.exec:\3xxfffl.exe80⤵PID:2548
-
\??\c:\5fxfrrx.exec:\5fxfrrx.exe81⤵PID:2588
-
\??\c:\pdjjd.exec:\pdjjd.exe82⤵PID:2480
-
\??\c:\7thnnh.exec:\7thnnh.exe83⤵PID:2584
-
\??\c:\frfxxrf.exec:\frfxxrf.exe84⤵PID:2840
-
\??\c:\lxffffl.exec:\lxffffl.exe85⤵PID:1864
-
\??\c:\vvjjj.exec:\vvjjj.exe86⤵PID:2300
-
\??\c:\tnnntt.exec:\tnnntt.exe87⤵PID:2156
-
\??\c:\xlfxxxf.exec:\xlfxxxf.exe88⤵PID:2344
-
\??\c:\9dppd.exec:\9dppd.exe89⤵PID:1348
-
\??\c:\htbtbb.exec:\htbtbb.exe90⤵PID:2208
-
\??\c:\rfxxxxf.exec:\rfxxxxf.exe91⤵PID:2380
-
\??\c:\xrlxffr.exec:\xrlxffr.exe92⤵PID:1572
-
\??\c:\jvjjp.exec:\jvjjp.exe93⤵PID:1420
-
\??\c:\hbbnnb.exec:\hbbnnb.exe94⤵PID:644
-
\??\c:\dvjpv.exec:\dvjpv.exe95⤵PID:2504
-
\??\c:\jdpdp.exec:\jdpdp.exe96⤵PID:1448
-
\??\c:\3thnnb.exec:\3thnnb.exe97⤵PID:2712
-
\??\c:\bntbtt.exec:\bntbtt.exe98⤵PID:2076
-
\??\c:\1nhhnb.exec:\1nhhnb.exe99⤵PID:2264
-
\??\c:\lflrlrx.exec:\lflrlrx.exe100⤵PID:788
-
\??\c:\vjpvj.exec:\vjpvj.exe101⤵PID:1560
-
\??\c:\5htbbb.exec:\5htbbb.exe102⤵PID:1416
-
\??\c:\lxlrxlx.exec:\lxlrxlx.exe103⤵PID:1584
-
\??\c:\frlrrrx.exec:\frlrrrx.exe104⤵PID:2088
-
\??\c:\jddpv.exec:\jddpv.exe105⤵PID:2484
-
\??\c:\vvpvv.exec:\vvpvv.exe106⤵PID:1028
-
\??\c:\fxxflxf.exec:\fxxflxf.exe107⤵PID:1716
-
\??\c:\rfxxllr.exec:\rfxxllr.exe108⤵PID:3048
-
\??\c:\xfffxrx.exec:\xfffxrx.exe109⤵PID:1208
-
\??\c:\ppjdj.exec:\ppjdj.exe110⤵PID:2980
-
\??\c:\1thntt.exec:\1thntt.exe111⤵PID:2860
-
\??\c:\xlffllx.exec:\xlffllx.exe112⤵PID:2016
-
\??\c:\xrrrflr.exec:\xrrrflr.exe113⤵PID:2816
-
\??\c:\vpdpv.exec:\vpdpv.exe114⤵PID:2792
-
\??\c:\nhbhbb.exec:\nhbhbb.exe115⤵PID:1216
-
\??\c:\ffrxllr.exec:\ffrxllr.exe116⤵PID:2604
-
\??\c:\ppjpp.exec:\ppjpp.exe117⤵PID:2968
-
\??\c:\btbhnh.exec:\btbhnh.exe118⤵PID:2508
-
\??\c:\3lllfrx.exec:\3lllfrx.exe119⤵PID:1524
-
\??\c:\vvjvv.exec:\vvjvv.exe120⤵PID:2764
-
\??\c:\bbnbhh.exec:\bbnbhh.exe121⤵PID:2704
-
\??\c:\1tnnnn.exec:\1tnnnn.exe122⤵PID:2600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-